{"id":"https://openalex.org/W2016471739","doi":"https://doi.org/10.1145/1143549.1143588","title":"Identity-based anonymous designated ring signatures","display_name":"Identity-based anonymous designated ring signatures","publication_year":2006,"publication_date":"2006-07-03","ids":{"openalex":"https://openalex.org/W2016471739","doi":"https://doi.org/10.1145/1143549.1143588","mag":"2016471739"},"language":"en","primary_location":{"id":"doi:10.1145/1143549.1143588","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1143549.1143588","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2006 international conference on Wireless communications and mobile computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100674347","display_name":"Yiqun Chen","orcid":"https://orcid.org/0000-0003-0672-9217"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Yiqun Chen","raw_affiliation_strings":["University of Wollongong, Australia","Univ. of Wollongong, Australia#TAB#"],"affiliations":[{"raw_affiliation_string":"University of Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"Univ. of Wollongong, Australia#TAB#","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054741725","display_name":"Willy Susilo","orcid":"https://orcid.org/0000-0002-1562-5105"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Willy Susilo","raw_affiliation_strings":["University of Wollongong, Australia","Univ. of Wollongong, Australia#TAB#"],"affiliations":[{"raw_affiliation_string":"University of Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"Univ. of Wollongong, Australia#TAB#","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008178136","display_name":"Yi Mu","orcid":"https://orcid.org/0000-0002-1637-845X"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yi Mu","raw_affiliation_strings":["University of Wollongong, Australia","Univ. of Wollongong, Australia#TAB#"],"affiliations":[{"raw_affiliation_string":"University of Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"Univ. of Wollongong, Australia#TAB#","institution_ids":["https://openalex.org/I204824540"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100674347"],"corresponding_institution_ids":["https://openalex.org/I204824540"],"apc_list":null,"apc_paid":null,"fwci":1.3956,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.84340593,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"189","last_page":"194"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9728999733924866,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.9206259846687317},{"id":"https://openalex.org/keywords/ring-signature","display_name":"Ring signature","score":0.8951809406280518},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7191687226295471},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.7086949348449707},{"id":"https://openalex.org/keywords/ring","display_name":"Ring (chemistry)","score":0.610970139503479},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6015112400054932},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.5275216698646545},{"id":"https://openalex.org/keywords/oracle","display_name":"Oracle","score":0.5133973360061646},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5007052421569824},{"id":"https://openalex.org/keywords/bilinear-interpolation","display_name":"Bilinear interpolation","score":0.45464572310447693},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.4501023292541504},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4362730085849762},{"id":"https://openalex.org/keywords/sign","display_name":"Sign (mathematics)","score":0.42782318592071533},{"id":"https://openalex.org/keywords/bilinear-map","display_name":"Bilinear map","score":0.42120304703712463},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.25579527020454407},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.22368231415748596},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.20520251989364624},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.19512876868247986}],"concepts":[{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.9206259846687317},{"id":"https://openalex.org/C168941894","wikidata":"https://www.wikidata.org/wiki/Q3483645","display_name":"Ring signature","level":4,"score":0.8951809406280518},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7191687226295471},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.7086949348449707},{"id":"https://openalex.org/C2780378348","wikidata":"https://www.wikidata.org/wiki/Q25351438","display_name":"Ring (chemistry)","level":2,"score":0.610970139503479},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6015112400054932},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.5275216698646545},{"id":"https://openalex.org/C55166926","wikidata":"https://www.wikidata.org/wiki/Q2892946","display_name":"Oracle","level":2,"score":0.5133973360061646},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5007052421569824},{"id":"https://openalex.org/C205203396","wikidata":"https://www.wikidata.org/wiki/Q612143","display_name":"Bilinear interpolation","level":2,"score":0.45464572310447693},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.4501023292541504},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4362730085849762},{"id":"https://openalex.org/C139676723","wikidata":"https://www.wikidata.org/wiki/Q1193832","display_name":"Sign (mathematics)","level":2,"score":0.42782318592071533},{"id":"https://openalex.org/C142685569","wikidata":"https://www.wikidata.org/wiki/Q1086961","display_name":"Bilinear map","level":3,"score":0.42120304703712463},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.25579527020454407},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.22368231415748596},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.20520251989364624},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.19512876868247986},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/1143549.1143588","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1143549.1143588","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2006 international conference on Wireless communications and mobile computing","raw_type":"proceedings-article"},{"id":"pmh:oai:ro.uow.edu.au:infopapers-2358","is_oa":false,"landing_page_url":"https://ro.uow.edu.au/infopapers/1338","pdf_url":null,"source":{"id":"https://openalex.org/S4306400510","display_name":"Research Online (University of Wollongong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I204824540","host_organization_name":"University of Wollongong","host_organization_lineage":["https://openalex.org/I204824540"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Faculty of Informatics - Papers (Archive)","raw_type":"presentation"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1484826441","https://openalex.org/W1500682127","https://openalex.org/W1538706266","https://openalex.org/W1574149717","https://openalex.org/W1608511627","https://openalex.org/W1610688607","https://openalex.org/W1763199136","https://openalex.org/W2107561818","https://openalex.org/W2129483619","https://openalex.org/W2149452334","https://openalex.org/W2169194339"],"related_works":["https://openalex.org/W2396944024","https://openalex.org/W2971398334","https://openalex.org/W2048194152","https://openalex.org/W2131561978","https://openalex.org/W2949682506","https://openalex.org/W2999264970","https://openalex.org/W2352317746","https://openalex.org/W2016471739","https://openalex.org/W140041957","https://openalex.org/W2049702087"],"abstract_inverted_index":{"In":[0],"this":[1,71],"paper,":[2],"we":[3,44,63],"propose":[4],"the":[5,16,31,101],"concept":[6,14],"of":[7,19,68,73,82],"identity-based":[8],"anonymous":[9,50],"designated":[10,40,51],"ring":[11,20,32],"signature.":[12],"This":[13],"extends":[15],"existing":[17],"notion":[18],"signatures":[21],"in":[22],"two":[23,57],"ways:":[24],"firstly,":[25],"it":[26],"allows":[27],"a":[28,35,39,54,79,84,89],"member":[29],"from":[30],"to":[33,38,47],"sign":[34],"message":[36],"directed":[37],"verifier,":[41],"but":[42,62],"secondly,":[43],"would":[45],"like":[46],"have":[48],"an":[49,66],"verifier.":[52],"At":[53],"glance,":[55],"these":[56],"additional":[58],"properties":[59],"seem":[60],"contradictory,":[61],"shall":[64],"show":[65],"example":[67],"situation":[69],"where":[70],"kind":[72],"primitive":[74],"is":[75,97],"required.":[76],"We":[77],"present":[78],"formal":[80],"model":[81],"such":[83],"scheme,":[85],"and":[86],"proceed":[87],"with":[88],"construction":[90],"based":[91],"on":[92],"bilinear":[93],"pairings.":[94],"Our":[95],"scheme":[96],"provably":[98],"secure":[99],"under":[100],"random":[102],"oracle":[103],"model.":[104]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
